0% found this document useful (0 votes)
239 views15 pages

Cipher

The document provides information about various encryption methods throughout history, beginning with early manual encryption techniques used by ancient civilizations. It then discusses the development of cipher machines, including early prototypes in the 15th-16th centuries and more advanced rotor-based machines in the early 20th century, most notably the German Enigma machine. The summary describes how Polish cryptanalysts first cracked the Enigma code and the efforts by British codebreakers at Bletchley Park, including Alan Turing, to build bombes that helped break Enigma messages during World War II.

Uploaded by

zrenn
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
239 views15 pages

Cipher

The document provides information about various encryption methods throughout history, beginning with early manual encryption techniques used by ancient civilizations. It then discusses the development of cipher machines, including early prototypes in the 15th-16th centuries and more advanced rotor-based machines in the early 20th century, most notably the German Enigma machine. The summary describes how Polish cryptanalysts first cracked the Enigma code and the efforts by British codebreakers at Bletchley Park, including Alan Turing, to build bombes that helped break Enigma messages during World War II.

Uploaded by

zrenn
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Easier - A code is a system of symbols, letters, words, or signals that are used instead of ordinary words and numbers

to send messages or store information. A code is used to keep the message short or to keep it secret. Harder - Codes and ciphers are forms of secret communication. A code replaces words, phrases, or sentences with groups of letters or numbers, while a cipher rearranges letters or uses substitutes to disguise the message. The technology of such secret communication is called cryptology. Secret writing has been employed about as long as writing has existed. Cryptology has long been employed by governments, military, businesses, and organizations to protect their messages. Today, encryption is used to protect storage of data and transactions between computers.

There were (and are) many ways to conceal writing. There are actually two separate methods generally used for messages: codes, which use symbols or groups of letters to represent words or phrases, and ciphers, where one letter is replaced with another by a either simple or a complex scheme. To those who aren't cryptologists, both codes and ciphers are usually referred to as codes. Codes and Ciphers :: Columnar Transposition In a columnar transposition, the message is written out in rows of a fixed length. The message is then read out by column by column, where the columns are chosen in some scrambled order. The number of columns and the order in which they are chosen is defined by a keyword. For example, the word ZEBRAS is 6 letters long. Therefore, there are 6 columns that will be read of in the following order: 6 3 2 4 1 5. The order is chosen by the alphabetical order of the letters in the keyword.

Regular Case In a regular columnar transposition cipher, the empty spaces are filled with random letters. For example, suppose we use the keyword ZEBRAS and the message WE ARE DISCOVERED FLEE AT ONCE. Our grid would look like this: ZEBRAS 632415 -----WEARED ISCOVE REDFLE EATONC EQKJEU The six columns are now written out in the scrambled order defined by the keyword: EVLNE ACDTK ESEAQ ROFOJ DEECU WIREE Irregular Case In the irregular case, the empty letters are not filled in with random letters:

ZEBRAS 632415 -----WEARED ISCOVE REDFLE EATONC E This results in the following (shorter) ciphertext: EVLNA CDTES EAROF ODEEC WIREE To decipher it, the recipient has to work out the column lengths by dividing the message length by the key length. This step is slightly more difficult if the irregular case is used. After determining the number of columns, the message can be written in columns and rearranged back into the plaintext message. Double Column Transposition To make the message even more difficult to decipher, you can take the ciphertext produced

by this algorithm and run it through the encryption again using a different keyword. This transposes the columns twice and makes the message extremely difficult to decipher.

Cipher Machines: From Antiquity to the Enigma Machine: Cipher Machines: From Antiquity to the Enigma Machine Dr. Wayne Summers TSYS Department of Computer Science Columbus State University [email protected] http://csc.colstate.edu/summers

Introduction to Cryptography and Encryption: Introduction to Cryptography and Encryption cryptography Greek words kryptos meaning hidden and grafi meaning writing and is the study of hiding written information through encoding or enciphering code is the replacing of a word or

phrase with a word, number or symbol cipher involves making letter-for-letter substitutions. Information can be hidden by either substituting other letters, words or symbols for the letters or words in the message or transposing the letters or words in the message. Cryptology is the overall study of codes and ciphers cryptoanalysis is the science of the decryption of codes and ciphers

Early Encryption: Early Encryption began in Egypt around 1900 BCE. The scribe for the Pharaoh Amenemhet II used hieroglyphic substitutions to impart dignity and authority to the inscriptions in the pyramids 500-1500 BCE, Assyrian and other cultures began hiding information tattooing the message on the heads of the messengers, carving the message in the stomach of animals, hiding the message under new wax 600 BCE, Hebrew scribes used a

simple substitution cipher known as ATBASH using a reverse alphabet. (used in book of Jeremiah)

SCYTALE: SCYTALE

Caesar cipher : Caesar cipher The message the caesar cipher is a substitution cipher becomes WKHFD HVDUF LSKHU LVDVX EVWLW XWLRQ FLSKH U

Early Encryption: Early Encryption Arab Cryptanalysis developed around the 8th century A.D. by Abu 'Abd alRahman al-Khalil ibn Ahmad ibn 'Amr ibn Tammam al Farahidi al-Zadi al Yahmadi who solved a cryptogram in Greek for the Byzantine emperor;

first to discover and write down the methods of cryptanalysis. Another Arab of the 9th century, Abu Yusuf Ya'qub ibn Is-haq ibn as-Sabbah ibn 'omran ibn Ismail al-Kindi wrote "A Manuscript on Deciphering Cryptographic Messages 1412, Arabic knowledge of cryptology fully described in the Subh al-a 'sha, 14-volume encyclopedia, written by Shihab al-Din abu 'l-Abbas Ahmad ben Ali ben Ahmad Abd Allah al-Qalqashandi During the Middle Ages in Europe, encryption was primarily restricted to the monks. " Around 1250 A.D., Roger Bacon, wrote the "Epistle on the Secret Works of Art and the Nullity of Magic describing seven deliberately vague methods of concealing a secret Around 1392 A.D., Geoffrey Chaucer wrote six short passages in cipher in his "The Equatorie of the Planetis" notes to his "Treatise on the Astrolabe

Early Cipher Machines: Early Cipher Machines Leon Battista Alberti (1404-1472) developed a cipher machine for mechanical encryption based on the Caesar cipher algorithm Alberti developed and published the first polyalphabetic cipher and designed a cipher disk to simplify the process "Father of Western Cryptography"

Jefferson Cylinder built late 1790s: Jefferson Cylinder built late 1790s

Wheatstone Cryptograph, originally invented by Wadsworth in 1817 : Wheatstone Cryptograph, originally invented by Wadsworth in 1817

Popular Cryptography: Popular Cryptography Jules Verne's decipherment of a parchment filled with runic characters in the Journey to the Center of the Earth. Sir Arthur Conan Doyle's detective, Sherlock Holmes, was an expert in cryptography. The Adventure of the Dancing Men, involves a cipher consisting of stick men, each representing a distinct letter. Edgar Allan Poe issued a challenge to the readers of Philadelphia's Alexander Weekly Messenger, claiming that he could decipher any mono-alphabetic substitution cipher. He successfully deciphered all of the hundreds of submissions. In 1843, he wrote a short story, "The Gold Bug

Mexican Army Cipher Disk (1913): Mexican Army Cipher Disk (1913) Use MERT as key m=1, e=27, r=53,t=79 The word College is

ciphered as 1703262619 2119 or 6476269719 6890 etc.

Rotor Cipher Machines: Rotor Cipher Machines first rotor machine was built in 1915 by two Dutch naval officers, Theo A. van Hengel and R. P.C. Spengler (de Leeuw) number of inventors independently developed similar rotor machines Most of the rotor machines used a typewriter-like keyboard for input and lighted letters for the output. Some of the later devices used punched card and paper tape for input and/or output

Enigma machine : Enigma machine designed by Arthur Scherbius (~1918) three interchangeable rotors geared together 26 x 26 x 26 (17,576) combinations of letters Steckerverbindungen (plug-board) was

introduced in 1928. Initially Stecker allowed 6 pairs of letters to be swapped. later expanded to 10 pairs. increased the number of possible settings (keys) to 159,000,000,000,000,000,000 (159 million million million) if 1,000 cryptographers, each with a captured Enigma, tested 4 keys/minute, all day, every day, it would take 1.8 billion years to try them all.

Enigma machine: Enigma machine Enigma operators were provided a codebook each month that specified the key for each day during the month. Use rotors 2-4-3 Set the rotors to V-F-P Use plugboard settings B/T D/G I/R - P/Y S/V W/Z each message was assigned a random key. message key was transmitted twice prior to the message being transmitted. E.g. if the day key is V-F-P, the operator might pick a message key of WAS. Using

the day key to encrypt the message key, the operator would then transmit WAS WAS followed by the message.

Enigma machine: Enigma machine

Cracking the Enigma machine : Cracking the Enigma machine Polish mathematicians, Marian Rejewski, Henryk Zigalski, and Jerzy Rozycki, reduced the problem of cracking the enigma code significantly, concentrating on the rotor settings exploiting the fact that the message key was transmitted twice. provided the design of the Enigma machine from a disgruntled German civil servant, Hans-Thilo Schmidt. Rejewski and his team developed a machine called a bombe that simulated the

working of six Enigma machines working in unison to try and determine the daily key.

Cracking the Enigma machine: Cracking the Enigma machine British Government Code and Cipher School (GC&CS) opened secret site at Bletchley Park team of codebreakers was led by Alan Turing and Gordon Welchman Turing and Welchmans bombe consisted of twelve sets of electrically linked Enigma scramblers crib piece of plaintext associated with a piece of ciphertext (ex. Wetter) Over 400 bombes built for use at Bletchley Park

Bombe: Bombe

Lorenz : Lorenz

Bletchley Park: Bletchley Park

Other Rotor Machines: Other Rotor Machines

You might also like